Making Believable Clones to hide yourself When I first tackled the problem of digital over-exposure, my tactical article walked you through the basics: flooding every device you own — phone, laptop, smartwatch — with harmless, random traffic so that any single data point became meaningless. In the Tactical Article I just published, we mixed in […]